Computer Science ›› 2017, Vol. 44 ›› Issue (1): 145-148, 154.doi: 10.11896/j.issn.1002-137X.2017.01.028

Previous Articles     Next Articles

Analysis on Fitting Model of Network Covert Timing Channel

YANG Peng, ZHAO Hui and BAO Zhong-gui   

  • Online:2018-11-13 Published:2018-11-13

Abstract: With the rapid development of computer network,the security of computer network has caused more and more peoples’ attention.Among lots of methods of network attack,network covert channels have become one of the main threats to the security of computers.Because of its undetectable nature and high data transmission rate,covert ti-ming channel has become one of current research hot spots in the field of information security.This paper constructed a model for the transmission process of network covert timing channel.The model describes how to encode and modulate covert messages using spreading code.On the basis,we analyzed the probability distribution of the constructed model,then made a more comprehensive contrast with the Poisson distribution which is used to fit the legitimate channel.Aiming at analyzing the concealment and data transmission rate of covert channels,we first analyzed the parameters which impact the above properties of covert timing channels,and also discussed the relationship between these properties,which has certain significance for the future work of network covert timing channels.

Key words: Covert channel,Concealment,Data transfer rate,Model,Coding

[1] LAMPSON B W.A note on the confinement problem[J].Communications of the ACM,1973,16(10):613-615 .
[2] ZANDER S,ARMITAGE G,BRANCH P.A survey of covert channels and counter measures in computer network protocols[J].Communication Surveys & Tutorials,2007,9(3):44-57.
[3] QIAN Yu-wen,ZHAO Bang-xin,KONG Jian-shou,et al.Robust Covert Timing Channel Based on Web[J].Journal of Computer Research and Development,2011,8(3):423-431.(in Chinese) 钱玉文,赵邦信,孔建寿,等.一种基于 Web 的可靠网络隐蔽时间信道的研究[J].计算机研究与发展,2011,48(3):423-431.
[4] PADLIPSKY M A,SNOW D W,KARGER P A.Limitations of end-to-end encryption in secure computer networks[R].Mitre Corp Bedford Ma,1978.
[5] GIRLING C G.Covert Channels in LAN’s[J].IEEE Transactions on Software Engineering,1987(2):292-296.
[6] SHAN G,MOLINA A,BLAZE M.Keyboards and Covert Channels[C]∥USENIX Security.2006.
[7] CABUK S,BRODLEY C E,SHIELDS C.IP covert timing channels:design and detection[C]∥ Proceedings of the 11th ACM Conference on Computer and Communications Security.ACM,2004:178-187.
[8] REZAEI F,HEMPEL M,SHRESTHA P L,et al.Achieving robustness and capacity gains in covert timing channels[C]∥2014 IEEE International Conference on Communications (ICC).IEEE,2014:969-974.
[9] BERK V,GIANI A,CYBENKO G,et al.Detection of covertchannel encoding in network packet delays[R].Department of Computer Science,Dartmouth College,2005.
[10] GIANVECCHIO S,WANG H.Detecting covert timing chan-nels:an entropy-based approach[C]∥ Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:307-316.
[11] SHRESTHA P,HEMPEL M,REZAEI F,et al.A Support Vector Machine-based Framework for Detection of Covert Timing Channels[J].IEEE Transactions on Dependable and Secure Computing,2016,3(2):274-283
[12] DARWISH O,AL-FUQAHA A,ANAN M,et al.The role ofhierarchical entropy analysis in the detection and time-scale determination of covert timing channels[C]∥ 2015 International Conference on Wireless Communications and Mobile Computing (IWCMC).IEEE,2015:153-159.
[13] LIU Y,GHOSAL D,ARMKNECHT F,et al.Hide and seek in time-robust covert timing channels[M]∥Computer Security-ESORICS 2009.Springer Berlin Heidelberg,2009:120-135.
[14] HOUMANSADR A,BORISOV N.CoCo:coding-based coverttiming channels for network flows[M]∥ Information Hiding.Springer Berlin Heidelberg,2011:314-328.
[15] LIU Y,GHOSAL D,ARMKNECHT F,et al.Robust and undetectable steganographic timing channels for iid traffic[M]∥Information Hiding.Springer Berlin Heidelberg,2010:193-207.
[16] GIANVECCHIO S,WANG H,WIJESEKERA D,et al.Model-based covert timing channels:Automated modeling and evasion[M]∥Recent Advances in Intrusion Detection.Springer Berlin Heidelberg,2008:211-230.
[17] PAXSON V,FLOYD S.Wide area traffic:the failure of Poisson modeling[J].IEEE/ACM Transaction on Networking (ToN),1995,3(3):226-244.
[18] RICHARDSON A M.Nonparametric Statistics:A Step-by-Step Approach[J].International Statistical Review,2015,83(1):163-164.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .